arxiv: v1 [cs.dc] 17 Nov 2016

Size: px
Start display at page:

Download "arxiv: v1 [cs.dc] 17 Nov 2016"

Transcription

1 Fog Computing: A Taxonomy, Survey and Future Directions Redowan Mahmud and Rajkumar Buyya arxiv: v1 [cs.dc] 17 Nov 2016 Abstract In recent years, the number of Internet of Things (IoT) devices/sensors has increased to a great extent. To support the computational demand of real-time latency-sensitive applications of largely geo-distributed IoT devices/sensors, a new computing paradigm named Fog computing has been introduced. Generally, Fog computing resides closer to the IoT devices/sensors and extends the Cloud-based computing, storage and networking facilities. In this chapter, we comprehensively analyse the challenges in Fogs acting as an intermediate layer between IoT devices/sensors and Cloud datacentres and review the current developments in this field. We present a taxonomy of Fog computing according to the identified challenges and its key features. We also map the existing works to the taxonomy in order to identify current research gaps in the area of Fog computing. Moreover, based on the observations, we propose future directions for research. 1 Introduction Fog computing is a distributed computing paradigm that acts as an intermediate layer in between Cloud datacentres and IoT devices/sensors. It offers compute, networking and storage facilities so that Cloud-based services can be extended closer to the IoT devices/sensors [1]. The concept of Fog computing was first introduced by Cisco in 2012 to address the challenges of IoT applications in conventional Cloud Redowan Mahmud Cloud Computing and Distributed Systems (CLOUDS) Laboratory, Department of Computing and Information System, The University of Melbourne, Parkville VIC 3010, Australia, mahmudm@student.unimelb.edu.au Rajkumar Buyya Cloud Computing and Distributed Systems (CLOUDS) Laboratory, Department of Computing and Information System, The University of Melbourne, Parkville VIC 3010, Australia, rbuyya@unimelb.edu.au 1

2 2 Redowan Mahmud and Rajkumar Buyya computing. IoT devices/sensors are highly distributed at the edge of the network along with real-time and latency-sensitive service requirements. Since Cloud datacentres are geographically centralized, they often fail to deal with storage and processing demands of billions of geo-distributed IoT devices/sensors. As a result, congested network, high latency in service delivery, poor Quality of Service (QoS) are experienced [2]. Cloud Fog Nodes IoT Devices and Sensors Fig. 1: Fog Computing Environment Typically, a Fog computing environment is composed of traditional networking components e.g. routers, switches, set top boxes, proxy servers, Base Stations (BS), etc. and can be placed at the closer proximity of IoT devices/sensors as shown in Fig. 1. These components are provided with diverse computing, storage, networking, etc. capabilities and can support service-applications execution. Consequently, the networking components enable Fog computing to create large geographical distributions of Cloud-based services. Besides, Fog computing facilitates location awareness, mobility support, real-time interactions, scalability and interoperability [3]. Thereby, Fog computing can perform efficiently in terms of service latency, power consumption, network traffic, capital and operational expenses, content distribution, etc. In this sense, Fog computing better meets the requirements with respect to IoT applications compared to a solely use of Cloud computing [4].

3 Fog Computing: A Taxonomy, Survey and Future Directions 3 However, the concept of Fog computing is very much similar to the existing computing paradigms. In this chapter, we elaborately discuss the fundamental differences of Fog computing with other computing paradigms. Here, we also analyse different aspects of Fog computing including corresponding resource architecture, service quality, security issues, etc. and review recent research works from the literature. We present a taxonomy based on the key properties and associated challenges in Fog computing. We map the existing works to the taxonomy to identify innovative approaches and limitations in this field. Based on the observations, we also propose potential future directions so that further improvement in Fog computing can be achieved. The rest of the chapter is organized as follows. In Section 2, we discuss the differences of Fog computing with other related computing approaches. After that, we describe the challenges of Fog computing and propose our taxonomy in Section 3 and Section 4, respectively. From Section 5 to Section 10, we map the existing research works to the proposed taxonomy. In Section 11, we analyze research gaps and present some promising directions towards future research in Fog computing. Finally, we summarize the findings and conclude the paper. 2 Related Computing Paradigms With the origination of Cloud computing, computation technology has entered to a new era. Many computation service providers including Google, Amazon, IBM, Microsoft, etc. are currently nurturing this popular computing paradigm as a utility. They have enabled cloud based services such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), etc. to handle numerous enterprise and educational related issues simultaneously. However, most of the Cloud datacentres are geographically centralized and situated far from the proximity of the end devices/users. As a consequence, real-time and latency-sensitive computation service requests to be responded by the distant Cloud datacentres often endure large round-trip delay, network congestion, service quality degradation, etc. To resolve these issues besides centralized Cloud computing, a new concept named Edge computing has recently been proposed [5]. The fundamental idea of Edge computing is to bring the computation facilities closer to the source of the data [6]. More precisely, Edge computing enables data processing at the edge network. Edge network basically consists of end devices (e.g. mobile phone, smart objects, etc.), edge devices (e.g. border routers, set-top boxes, bridges, base stations, wireless access points etc.), edge servers, etc. and these components can be equipped with necessary capabilities for supporting edge computation. As a localized computing paradigm, Edge computing provides faster responses to the computational service requests and most often resists bulk raw data to be sent towards core network. However, in general Edge computing does not associate IaaS, PaaS, SaaS and other cloud based services spontaneously and concentrate more towards the end devices side [6].

4 4 Redowan Mahmud and Rajkumar Buyya Taking the notion of Edge and Cloud computing into account, several computing paradigms have already been introduced in computation technology. Among them Mobile Edge Computing (MEC), Mobile Cloud Computing (MCC) are considered as the potential extensions of Cloud and Edge computing. As an edge-centric computing paradigm, MEC has already created significant buzz in the research domain. MEC has been regarded as one of the key enablers of modern evolution of cellular base stations. It offers edge servers and cellular base staions to be operated combinedly [7]. MEC can be either connected or not connected with distant Cloud datacentres. Thus along with end mobile devices, MEC supports 2 or 3 tire hierarchical application deployment in the network [8]. Besides, MEC targets adaptive and faster initiation of cellular services for the customers and enhances network efficiency. In recent times, significant improvement in MEC has been made so that it can support 5G communications. Moreover, it aims at flexible access to the radio network information for content distribution and application development [9] [10]. MCC is another recent trend in computation. Due to the proliferation of smart mobile devices, nowadays end users prefer to run necessary applications in their handheld devices rather than traditional computers. However, most of the smart mobile devices are subjected to energy, storage and computational resource constraints [11]. Therefore, in critical scenarios, it is more feasible to execute compute intensive applications outside the mobile devices compared to execute those applications locally. In this case, MCC provides necessary computational resources to support such remote execution of offloaded mobile applications in closer proximity of end users [12] [13]. In MCC, most often light-weight cloud servers named cloudlet [14] are placed at the edge network. Along with end mobile devices and Cloud datacentres, cloudlets develop a 3 tire hierarchical application deployment platform for rich mobile applications [8]. In brief, MCC combines cloud computing, mobile computing and wireless communication to enhance Quality of Experience (QoE) of mobile users and creates new business opportunities for both network operators and cloud service providers. Like MEC and MCC, Fog computing can also enable edge computation. However, besides edge network, Fog computing can be expanded to the core network as well [3]. More precisely, both edge and core networking (e.g. core routers, regional servers, wan switches, etc.) components can be used as computational infrastructure in Fog computing (Fig. 2). As a consequence, multi-tire application deployment and service demand mitigation of huge number of IoT devices/sensors can easily be observed through Fog computing. In addition, Fog computing components at the edge network can be placed closer to the IoT devices/sensors compared to cloudlets and cellular edge servers. As IoT devices/sensors are densely distributed and require real-time responses to the service requests, this approach enables IoT data to be stored and processed within the vicinity of IoT device/sensors. As a result, service delivery latency for real-time IoT applications will be minimized to a great extent. Unlike Edge computing, Fog computing can extend cloud based services like IaaS, PaaS, SaaS, etc. to the edge of the network as well. Due to the aforementioned fea-

5 Fog Computing: A Taxonomy, Survey and Future Directions 5 tures, Fog computing is considered as more potential and well structured for IoT compared to other related computing paradigms. Edge Network Cloud Data Centres Cloud Computing Core Network Fog Computing Edge Computing Mobile Cloud Computing Mobile Edge Computing Edge Servers Fig. 2: Computation domain of Cloud, Fog, Edge, Mobile Cloud and Mobile Edge computing

6 6 Redowan Mahmud and Rajkumar Buyya 3 Challenges in Fog computing Fog computing is considered as the promising extension of Cloud computing paradigm to handle IoT related issues at the edge of network. However, in Fog computing, computational nodes are heterogeneous and distributed. Besides, Fog based services have to deal with different aspects of constrained environment. Assurance of security is also predominant in Fog computing. Analysing the features of Fog computing from structural, service oriented and security perspectives, the challenges in this field can be listed as follows. Structural issues. In edge network, there reside many devices and components that can be used as potential Fog computing infrastructures. Based on operational requirements and execution environment, the selection of suitable Fog nodes, corresponding configurations and places of deployment are vital in Fog computing. In Fog computing, computational nodes are distributed across the edge network and can be virtualized or shared. In this case, identification of appropriate techniques, metrics, etc. for inter-nodal collaboration and efficient resource provisioning are important. The structural orientation of Fog computing is compatible for IoT. However, competency assurance of Fog computing in other networking systems such as Content Distribution Network (CDN), vehicular network, etc. will be very challenging. Service oriented. Not all Fog nodes are resource enriched. Therefore, large scale applications development in resource constrained nodes are not quite easy compared to conventional datacentres. In this case, potential programming platform for distributed applications development in Fog are required to be introduced. Policies to distribute computational tasks and services among IoT devices/ sensors, Fog and Cloud infrastructures are required to be specified. Data visualization through web-interfaces are also difficult to design in Fog computing. In Fog computing, the Service Level Agreement (SLA) is often affected by many factors such as, service cost, energy usage, application characteristics, data flow, network status etc. Therefore, on a particular scenario, it is quite difficult to specify the service provisioning metrics and corresponding Service Level Objectives (SLOs). Security aspects. Since Fog computing is designed upon traditional networking components, it is highly vulnerable to security attacks. Authenticated access to services and maintenance of privacy in a largely distributed paradigm like Fog computing are hard to ensure. Implementation of security mechanisms for data-centric integrity can affect the QoS of Fog computing to a great extent.

7 Fog Computing: A Taxonomy, Survey and Future Directions 7 In addition to aforementioned challenges service scalability, end users QoE, context-awareness, mobility support are very crucial performance indicator for Fog computing and very difficult to deal with in real-time interactions. 4 Taxonomy Fig. 2 represents our proposed taxonomy for Fog computing. Based on the identified challenges from Section 3, the taxonomy provides a classification of the existing works in Fog computing. More precisely, the taxonomy highlights the following aspects in Fog computing. Fog Nodes Configuration. The computational nodes with heterogeneous architecture and configurations that are capable to provide infrastructure for Fog computing at the edge of the network. Nodal Collaboration. The techniques for managing nodal collaboration among different Fog nodes within the edge network. Resource/Service Provisioning Metric. The factors that contribute to provision resources and services efficiently under different constraints. Service Level Objectives. The SLOs that have been attained by deploying Fog computing as an intermediate layer between Cloud datacentres and end devices/sensors. Applicable Network System. The different networking systems where Fog computing has been introduced as extension of other computing paradigms. Security Concern. The security issues that have been considered in Fog computing on different circumstances. Proposed system and corresponding solutions in the existing works generally covers different categories of the taxonomy. However, as this taxonomy is designed based on the associated features of Fog computing, it does not reflect the relative performance of the proposed solutions. Actually, the reviewed existing works considers diverse execution environment, networking topology, application characteristics, resource architecture, etc. and targets different challenges. Therefore, identification of the best approach for Fog computing in terms of structural, service and security aspects is very difficult. In the following sections (from Section 5 to Section 10), we map the existing works in Fog computing to our proposed taxonomy and discuss different facts in detail.

8 8 Redowan Mahmud and Rajkumar Buyya Fog Nodes Configuration Servers Networking devices Cloudlets Base stations Vehicles Nodal Collaboration Cluster P2P Master-slave Fog Computing Resource/Service Provisioning Metrics Service Level Objectives Time Latency Management Communication Cost Management Computation Deadline Network Management Data Flow Size Congestion Virtualization Connectivity Cost Computation Management Networking Resource Estimation Deployment Workload Allocation Execution Coordination Context Application Management User Programming Platform Application Scaling Energy& Carbon footprint Offloading Data Management Power Management Fig. 3: Taxonomy of Fog Computing. Applicable Networking System IoT Mobile network/ran LRPON/PLC Vehicular Network CDN Security Concern Authentication Encryption Privacy DoS Attack

9 Fog Computing: A Taxonomy, Survey and Future Directions 9 5 Fog Nodes Configuration Five types of Fog nodes and their configurations have been mentioned in the literature: namely servers, networking devices, cloudlets, base stations, vehicles. 5.1 Servers The Fog servers are geo-distributed and are deployed at very common places for example; bus terminals, shopping centres, roads, parks, etc. Like light-weight Cloud servers, these Fog servers are virtualized and equipped with storage, compute and networking facilities. There are many works that have considered Fog servers as main functional component of Fog computing. In some papers based on the physical size, Fog servers are termed as micro servers, micro datacentres (Lee et al. [15], Aazam et al. [16]), nano servers (Jalali et al. [17]), etc. whereas other works categorize Fog servers based on their functionalities like cache servers (Zhu et al. [18]), computation servers, storage servers (Zeng et al. [19]), etc. Server based Fog node architecture enhances the computation and storage capacity in Fog computing. However, it limits the pervasiveness of the execution environment. 5.2 Networking Devices Devices like gateway routers, switches, set-top boxes, etc. besides their traditional networking activities (routing, packet forwarding, analog to digital signal conversions, etc.) can act as potential infrastructure for Fog computing. In some existing works, the networking devices are designed with certain system resources including data processors, extensible primary and secondary memory, programming platforms, etc. (Hong et al. [20], Nazmudeen et al. [21]). In other works, apart from conventional networking devices, several dedicated networking devices like Smart gateways (Aazam et al. [22]), IoT Hub (Cirani et al. [23]) have been introduced as Fog nodes. Distributed deployment of networking devices helps Fog computing to be ubiquitous although physical diversity of the devices significantly affects service and resource provisioning. 5.3 Cloudlets Cloudlets are considered as micro-cloud and loacted at the middle layer of end device, cloudlet, and Cloud hierarchy. Basically cloudlets have been designed for extending Cloud based services towards mobile device users and can complement

10 10 Redowan Mahmud and Rajkumar Buyya MCC [11]. In several works (Dsouza et al. [24], Cardellini et al. [25]), cloudlets are mentioned as Fog nodes. Cloudlet based Fog computing are highly virtualized and can deal with large number of end devices simultaneously. In some cases, due to structural constraints, cloudlets even after deploying at the edge act as centralized components. In this sense, the limitations of centralized computation still remain significant in Fog computing which resist to support IoT. 5.4 Base Stations Base stations are very important components in mobile and wireless networks for seamless communication and data signal processing. In recent works, traditional base stations equipped with certain storing and computing capabilities are considered suitable for Fog computing (Yan et al. [26], Gu et al. [27]). Like traditional base stations, Road Side Unit (RSU) (Truong et al. [28]) and small cell access points (Oueis et al. [29]), etc. can also be used as potential Fog nodes. Base stations are preferable for Fog based extension of Cloud Radio Access Network (CRAN), Vehicular Adhoc Network (VANET), etc. However, formation of a dense Fog environment with base stations is subjected to networking interference and high deployment cost. 5.5 Vehicles Moving or parked vehicles at the edge of network with computation facilities can serve as Fog nodes (Hou et al. [30], Ye et al. [31]). Vehicles as Fog nodes can form a distributed and highly scalable Fog environment. However, the assurance of privacy and fault tolerance along with desired QoS maintenance will be very challenging in such environment. 6 Nodal Collaboration Three techniques (cluster, peer to peer and master-slave) for nodal collaboration in Fog computing have been specified in the literature. 6.1 Cluster Fog nodes residing at the edge can maintain a collaborative execution environment by forming cluster among themselves. Clusters can be formed either based on the

11 Fog Computing: A Taxonomy, Survey and Future Directions 11 homogeneity of the Fog nodes (Cardellini et al. [25]) or their location (Hou et al. [30]). Computational load balancing (Oueis et al. [32]) and functional sub-system development (Faruque et al. [33]) can also be given higher priority while forming cluster among the nodes. Cluster based collaboration is effective in exploiting capabilities of several Fog nodes simultaneously. However, static clusters are difficult to make scalable in runtime and dynamic formation of clusters largely depends on the existing load and the availability of Fog nodes. In both cases networking overhead plays a vital role. 6.2 Peer to Peer In Fog computing Peer to Peer (P2P) collaboration among the nodes is very common. P2P collaboration can be conducted in both hierarchical (Hong et al. [20]) and flat order (Shi et al. [34]). Besides based on proximity, P2P collaboration between Fog nodes can be classified as home, local, non-local, etc. (Jalali et al. [17]). Through P2P collaboration not only processed output of one node appears as input to another node (Giang et al. [35]) but also virtual computing instances are shared between the nodes (Dsouza et al. [24]). Augmentation of Fog nodes in P2P collaboration is quite simple and nodes can be made reusable. However, reliability and access control related issues are predominant in P2P nodal collaboration. 6.3 Master-Slave In several works, master-slave based nodal collaboration has been mentioned elaborately. Through master-slave based collaboration generally a master Fog node controls functionalities, processing load, resource management, data flow, etc. of underlying slave nodes (Lee et al. [15]). Besides, master-slave based approach along with cluster and P2P based nodal interactions can form a hybrid collaborative network within the Fog computing environment (Nazmudeen et al. [21], Truong et al. [28]). However, in real-time data processing due to this kind of functional decomposition, the master and the slave Fog nodes require high bandwidth to communicate with each other. 7 Resource/Service Provisioning Metrics In existing literature of Fog computing many factors including time, energy, userapplication context, etc. have been found playing important roles in resource and service provisioning.

12 12 Redowan Mahmud and Rajkumar Buyya 7.1 Time In Fog computing paradigm, time is considered as one of the important factors for efficient resource and service provisioning. Computation time refers to the required time for task execution. Computation time of an application largely depends on resource configuration where the application is running or the task has been scheduled (Zeng et al. [19]) and can be changed according to the existing load. Besides, task computation time helps to identify the active and idle periods of different applications which significantly influences resource and power management in Fog (Jalali et al. [17]). Communication time basically defines the networking delay to exchange data elements in Fog computing environment. In the literature it has been discussed in 2 folds: End device/sensors to Fog nodes (Intharawijitr et al. [36]), Fog nodes to Fog nodes (Zeng et al. [19]). Required communication time reflects the network context which assists selection of suitable Fog nodes for executing tasks. Deadline specifies the maximum delay in service delivery that a system can tolerate. In some papers deadline satisfied task completion has been considered as important parameter for measuring QoS of the system (Oueis et al. [29], Ye et al. [31]). Basically service delivery deadline plays a significant role in characterizing latency sensitive and latency tolerant applications. In addition, the impact of other time based metrics like data sensing frequency of end device/sensors, service access time in multi-tenant architecture, expected service response time, etc. can be investigated for efficient service and resource provisioning in Fog computing. 7.2 Data Among data-centric metrics, input data size and data flow characteristics are found very common in Fog computing literature. Data size points to the amount of data that has to be processed through Fog computing. In several works, data size has been discussed in respect of computational space requirements of the requests (Shi et al. [34]). Besides, bulk data collected from distributed devices/sensors can contain the features of Big Data (Nazmudeen et al. [21]) as well. In this case, provisioning resource and service according to the data load can be an effective approach. Moreover, data size plays an important role in making decision about either local or remote processing of the corresponding computaional tasks (Peng et al. [37]). Data flow defines the characteristics of data transmission. Data flow through out the Fog computing environment can be event driven (Lee et al. [15]) or real time (Giang et al. [35]) and can influence resource and associated service provisioning to a great extent. Besides, sudden change in data flow sometimes promotes dynamic load balancing among the nodes (Oueis et al. [32]).

13 Fog Computing: A Taxonomy, Survey and Future Directions 13 Moreover, the effectiveness of heterogeneous data architecture, data semantic rules, data integrity requirements can also be studied for resource and service provisioning in Fog computing. 7.3 Cost In certain cases, cost related factors in Fog computing become very influential in resource and service provisioning. Networking cost in Fog computing environment is directly related to the bandwidth requirements and associated expenses. In several works data uploading cost from end devices/sensors and inter-nodal data sharing cost have been considered as the elements of networking cost (Gu et al. [27]) whereas in other works, experienced network latency due to bandwidth issues has been termed as networking cost (Hassan et al. [38]). Deployment cost is basically associated with the infrastructure placement related expenses in Fog computing environment. In some papers cost-effective infrastructure deployment has been considered supportive for efficient resource and service provisioning. Infrastructure deployment cost can be discussed in terms of both placing Fog nodes in the network (Zhang et al. [39]) and creating virtual computing instances in Fog nodes (Gu et al. [27]). Execution cost refers to the computational expenses of Fog nodes while running applications or processing tasks. Although in other computing paradigms execution cost is widely used in resource provisioning and billing, in Fog computing this metric has been used in very few works. In these works total execution cost has been calculated in terms of task completion time and per unit time resource usage cost (Hassan et al. [38]). In addition to aforementioned costs, expenses related to security safeguards, the maximum price that an user is willing to pay for a service, migration costs can also be considered for resource and service provisioning in Fog computing. 7.4 Energy Consumption and Carbon Footprint In several works, energy related issues have been given higher priority in provisioning Fog resources and services. The energy consumption of all devices in homebased Fog computing environment (Faruque et al. [33]) and the energy-latency tradeoff in different phases of Fog-Cloud interaction (Deng et al. [40]) have been highlighted widely in these works. In another work, carbon emission rate of different nodes in respect of per unit energy usage have been considered for resource provisioning purposes (Do et al. [41]).

14 14 Redowan Mahmud and Rajkumar Buyya As end devices/sensors are energy-constrained, energy aspects of end components for example residual battery lifetime, energy-characteristics of communication medium can also be investigated in provisioning Fog resources. 7.5 Context Context refers to situation or condition of a certain entity in different circumstances. In Fog based research works user and application level context have been discussed for resource and service provisioning. User context such as user characteristics, service usage history, service relinquish probability, etc. can be used for allocating resources for that user in future (Aazam et al. [42]). Users service feedback for example Net Promoter Score (NPS) and user requirements (Datta et al. [43]) can also be used for service and resource provisioning purposes (Aazam et al. [44]). In other works users density (Yan et al. [26]), mobility (Hou et al. [30]) and network status (Zhu et al. [18]) have also been considered for service provisioning. Application context can be considered as operational requirements of different applications. Operational requirements includes task processing requirements ( CPU speed, storage, memory) (Aazam et al. [22], Truong et al. [28], Gazis et al. [45]), networking requirements (Cirani et al. [23], Dsouza et al. [24]), etc. and can affect resource and service provisioning. In other works current task load of different applications (Cardellini et al. [25], Shi et al. [34]) have also been considered as application context. Moreover, contextual information in Fog computing can be discussed in terms of execution environment, nodal characteristics, application architecture, etc. and along with the other contexts they can play vital roles in provisioning resource and services. Therefore, it is essential to investigate the impact of every contextual information in-detail. 8 Service Level Objectives In existing literature, several unique Fog node architecture, application programming platform, mathematical model and optimization technique have been proposed to attain certain SLOs. Most of the attained SLOs are management oriented and cover latency, power, cost, resource, data, application, etc. related issues.

15 Fog Computing: A Taxonomy, Survey and Future Directions Latency Management Latency management in Fog computing basically resists the ultimate service delivery time from surpassing an accepted threshold. This threshold can be the maximum tolerable latency of a service request or applications QoS requirement. To ensure proper latency management, in some works efficient initiation of nodal collaboration has been emphasized so that the computation tasks through the collaborated nodes can be executed within the imposed latency constraints (Oueis et al. [29]). In another work, computation task distribution between the client and Fog nodes have been conducted with a view to minimizing the total computation and communication latency of service requests (Zeng et al. [19]). Besides, in another work architecture of low-latency Fog network has been proposed for latency management (Intharawijitr et al. [36]). The basic intention of this work is to select that node from the Fog network which provides lowest latency in service delivery. 8.2 Cost Management Cost management in Fog computing can be discussed in terms of Capital Expenses (CAPEX) and Operating Expenses (OPEX). The main contributor of CAPEX in Fog computing is the deployment of cost of distributed Fog nodes and their associated networks. In this case, suitable placement and optimized number of Fog nodes play a significant role in minimizing the CAPEX in Fog computing. Investigating this issue, a Fog computing network architecture has been proposed in (Zhang et al. [39]) that minimizes the total CAPEX in fog computing by optimizing the places and numbers of Fog node deployment. In another work (Gu et al. [27]), Fog nodes have been considered as virtualized platforms for launching VMs. Execution of data processing operations in these VMs are not free of cost and the cost can be varied from provider to provider. Therefore, it is feasible to exploit cost-diversity of different Fog nodes/ providers for minimizing OPEX in Fog computing. In respect to this fact, a solution to find suitable set of Fog nodes for hosting VMs has been proposed in that paper which aims to minimize the OPEX in Fog computing. 8.3 Network Management Network management in Fog computing includes core-network congestion control, support for Software Define Network (SDN)/ Network Function Virtualization (NFV), assurance of seamless connectivity, etc. Network congestion mainly occurs due to increasing overhead on the network. As in IoT, end devices/sensors are highly distributed across the edge, simultaneous

16 16 Redowan Mahmud and Rajkumar Buyya interactions of end components with Cloud datacentres can increase the overhead on the core network to a great extent. In such case network congestion will occur and degrade the performance of the system. Taking cognizance of this fact, in (Aazam et al. [22]) a layered architecture of Fog node has been proposed that provides local processing of the service requests. As a consequence, despite of receiving bulk service requests, Clouds get consized version of the requests which contribute less to the network congestion. Virtualization of conventional networking system has already drawn significant research attention. SDN is considered as one of the key enablers of virtualized network. SDN is a networking technique that decouples the control plane from networking equipment and implements in software on separate servers. One of the important aspects of SDN is to provide support for NFV. Basically, NFV is an architectural concept that virtualizes traditional networking functions (network address translation (NAT), firewalling, intrusion detection, domain name service (DNS), caching, etc.) so that they can be executed through software. In Cloud based environment SDN and NFV is quite influencing due to their wide range of services. Being motivated by this, in several research works (Lee et al. [15], Truong et al. [28], Peng et al. [37]) new network structures of Fog computing have been proposed to enable SDN and NFV. Connectivity ensures seamless communication of end devices with other entities like Cloud, Fog, Desktop computers, Mobile devices, end devices, etc. despite of their physical diversity. As a consequence, resource discovery, maintenance of communication and computation capacity become easier within the network. Several works in Fog computing have already targeted this issue and proposed new architecture of Fog nodes e.g IoT Hub (Cirani et al. [23]) and Fog networking e.g Vehicular Fog Computing (Hou et al. [30]) for connectivity management and resource discovery. Besides, for secured connectivity among the devices a policy driven framework has also been developed for Fog computing (Dsouza et al. [24]). 8.4 Computation Management Among the attained SLOs, assurance of proper computational resource management in Fog computing is very influential. Fog computing resource management includes resource estimation, workload allocation, resource coordination, etc. Resource estimation in Fog computing helps to allocate computational resources according to some policies so that appropriate resources for further computaton can be allocated, desired QoS can be achieved and accutare service price can be imposed. In existing literature, resource estimation policies are developed in terms of user characteristics, experienced QoE, features of service accessing devices, etc. (Aazam et al. [16][42][44]). Workload allocation in Fog computing should be done in such a way so that utilization rate of resources become maximized and longer computational idle period get minimized. More precisely, balanced load on different components is ensured.

17 Fog Computing: A Taxonomy, Survey and Future Directions 17 In a Fog based research work (Zeng et al. [19]), scheduling based workload allocation policy has been introduced to balance computation load on Fog nodes and client devices. As a consequence overhead on both parts become affordable and enhance QoE. In another work (Deng et al. [40]) a workload allocation framework has been proposed that balances delay and power consumption in Fog-Cloud interaction. Coordination among different Fog resources is very essential as they are heterogeneous and resource constrained. Due to decentralized nature of Fog computing, in most cases large scale applications are distributively deployed in different Fog nodes. In such scenarios without proper co-ordination of Fog resources, attainment of desired performance will not be very easy. Considering this fact, in (Giang et al. [35]) a directed graph based resource co-ordination model has been proposed for Fog resource management. 8.5 Application Management In order to ensure proper application management in Fog computing, efficient programming platforms are very essential. Besides the scalability and computation offloading facilities also contribute significantly in application management. Programming platform provides necessary components such as interfaces, libraries, run-time environment, etc. to develop, compile and execute applications. Due to dynamic nature of Fog computing, assurance of proper programming support for large-scale applications is very challenging. In order to overcome this issue, a new programming platform named Mobile Fog (Hong et al. [20]) has been introduced. Mobile Fog offers simplified abstraction of programming models for developing large-scale application over heterogeneous-distributed devices. In another paper (Giang et al. [35]), besides coordinating resources during applications execution, a programming platform based on distributed data flow approach has also been designed for application development in Fog computing. Scaling points to the adaptation capability of applications in retaining their service quality even after proliferation of application users and unpredictable events. Sacling techniques can also be applied in application scheduling and users service access. To support scalable scheduling of data stream applications, architecture of a QoS-aware self adaptive scheduler (Cardellini et al. [25]) has been recently proposed in Fog computing. This scheduler can scale applications with the increasing of both users and resources and does not ask for global information about the environment. Moreover, due to self-adaptive capability of the scheduler, automatic reconfiguration of the resources and placement of applications in a distributed fashion become easier. Besides, based on distance, location and QoS requirements of the service accessing entities, an adaptive technique for users service access mode selection has also been proposed in Fog computing (Yan et al. [26]). Offloading techniques facilitate resource constrained end devices in sending their computational tasks to some resource-enriched devices for execution. Computational offloading is very common in mobile cloud environment. However, re-

18 18 Redowan Mahmud and Rajkumar Buyya cently, as a part of compatibility ehnacement of Fog computing for other networking systems, computation offloading support for mobile applications in Fog computing have been emphasized in several papers. In these papers offloading techniques have been discussed in terms of both distributed computation of mobile applications (Shi et al. [34]) and resources availability (Hassan et al. [38]). 8.6 Data Management Data management is another important SLO that is highly required to be achieved for efficient performance of Fog computing. In different research works data management in Fog computing has been discussed from different perspectives. In (Aazam et al. [22], Datta et al. [43]) initiation of proper data analytic services and resource allocation for data pre-processing have been focused for data management policy in Fog computing. Besides, low-latency aggregation of data coming from distributed end devices/sensors can also be considered for efficient data management (Nazmudeen et al. [21]). Moreover, the storage capability of end devices/sensors are not so reach. In this case, storage augmentation in Fog computing for preserving data of end entities can be very influential. Therefore, in (Hassan et al. [38]) besides application management, storage expansion in Fog computing for mobile devices have also been discussed as integral part of data management. 8.7 Power Management Fog computing can be used as an effective platform for providing power management as a service for different networking systems. In (Faruque et al. [33]), a service platform for Fog computing has been proposed that can enable power management in home based IoT network with customized consumer control. Additionally, Fog computing can manage power usage of centralized Cloud data centres in certain scenarios. Power consumed by Cloud datacentres largely depends on type of running applications. In this case, Fog computing can complement Cloud datacentres by providing infrastructure for hosting several energy-hungry applications. As a consequence energy consumption in Cloud datacentres will be miniized that eventually ensures proper power management for Cloud datacentres (Jalali et al. [17]). Moreover, by managing power in Fog computing emission of carbon footprint can also be controlled (Do et al. [41]).

19 Fog Computing: A Taxonomy, Survey and Future Directions 19 9 Applicable Network System Fog computing plays a significant role in IoT. However, in recent research works the applicability of Fog computing in other networking systems (mobile network, content distribution network, radio access network, vehicular network, etc.) have also been highlighted. 9.1 Internet of Things In IoT, every devices are interconnected and able to exchange data among themselves. IoT environment can be described from different perspectives. Besides specifying IoT as a network for device to device interaction (Hong et al. [20], Cirani et al. [23], Giang et al. [35]), in several Fog based research works this interaction have been classified under industry (Gazis et al. [45]) and home (Faruque et al. [33]) based execution environment. Moreover, Wireless Sensors and Actuators Network (Lee et al. [15]), Cyber-Physical Systems (Gu et al. [27]), Embedded system network (Zeng et al. [19]), etc. have also been considered as different forms of IoT while designing system and service models for Fog computing. 9.2 Mobile Network / Radio Access Network Mobile network is another networking system where applicability of Fog computing has been explored through several research works. Basically, in these works much emphasize has been given on investigating the compatibility of Fog computing in 5G mobile networking (Oueis et al. [29] [32], Intharawijitr et al. [36]). 5G enables higher speed communication, signal capacity and much lower latency in service delivery compared to existing cellular systems. Besides 5G, Fog computing can also be applied in other mobile networks like 3G, 4G, etc. Moreover, in another work (Deng et al. [40]), power-delay tradeoff driven workload allocation in Fog-Cloud for mobile based communication has been investigated in detail. Radio Access Network (RAN) facilitates communication of individual devices with other entities of a network through radio connections. Cloud assisted RAN named CRAN has already drawn significant research attention. In order to complement CRAN, the potentiality of Fog computing based radio access network has also been explored in (Peng et al. [37]).

20 20 Redowan Mahmud and Rajkumar Buyya 9.3 Long-Reach Passive Optical Network / Power Line Communication Long-Reach Passive Optical Network (LRPON) has been introduced for supporting latency-sensitive and bandwidth-intensive home, industry, and wireless oriented backhaul services. Besides, covering a large area, LRPONs simplify network consolidation process. In (Zhang et al. [39]), Fog computing has been integrated with LRPONs for optimized network design. Power-line communication (PLC) is a widely used communication method in Smart Grid. In PLC, using electrical wiring both data and Alternating Current (AC) are simultaneously transmitted. Fog computing enabled PLC in electric power distribution has been discussed elaborately in (Nazmudeen et al. [21]). 9.4 Content Distribution Network Content Distribution Network (CDN) is composed of distributed proxy servers that provide content to end-users ensuring high performance and availability. In several Fog based research works (Zhu et al. [18], Do et al. [41]), Fog nodes are considered as content servers to support content distribution through Fog computing. Since Fog nodes are placed in distributed manner across the edge of the network, Fog based content services can be accessed by the end users within a very minimal delay. As a consequence, high performance in content distribution will be easier to ensure. 9.5 Vehicular Network Vehicular network enables autonomous creation of a wireless communication among vehicles for data exchange and resource augmentation. In this networking system vehicles are provided with computational and networking facilities. In several research works (Truong et al. [28], Hou et al. [30], Ye et al. [31]) vehicles residing at the edge network are considered as Fog nodes to promote Fog computing based vehicular network. 10 Security Concern Security vulnerability of Fog computing is very high as it resides at the underlying network between end device/sensors and Cloud datacentres. However, in existing literature, security concerns in Fog computing has been discussed in terms of users authentication, privacy, secured data exchange, DoS attack, etc.

21 Fog Computing: A Taxonomy, Survey and Future Directions Authentication Users authentication in Fog based services play an important role in resisting intrusion. Since Fog services are used in pay as you go basis, unwanted access to the services are not tolerable in any sense. Besides user authentication, in (Dsouza et al. [24]), device authentication, data migration authentication and instance authentication has also been observed for secured Fog computing environment Privacy Fog computing processes data coming from end device/sensors. In some cases, these data are found very closely associated with users situation and interest. Therefore, proper privacy assurance is considered as one of the important security concerns in Fog computing. In (Hou et al. [30]) the challenges regarding privacy in Fog based vehicular computing have been pointed for further investigation Encryption Basically, Fog computing complements Cloud computing. Data that has been processed in Fog computing, in some cases has to be forwarded towards Cloud. As these data often contains sensitive information, it is highly required to encrypt them in Fog nodes. Taking this fact into account, in (Aazam et al. [22]), a data encryption layer has been included in the proposed Fog node architecture DoS Attack Since, Fog nodes are resource constraint, it is very difficult for them to handle large number of concurrent requests. In this case, performance of Fog computing can be degraded to a great extent. To create such severe service disruptions in Fog computing, Denial-of-Service (DoS) attacks can play vital roles. By making a lot of irrelevant service requests simultaneously, Fog nodes can be made busy for a longer period of time. As a result, resources for hosting useful services become unavailable. In (Cirani et al. [23]), this kind of DoS attack in Fog computing has been discussed with clarification.

22 22 Redowan Mahmud and Rajkumar Buyya Table 1: Review of state-of-art in Fog Computing Work Fog Nodes Nodal Collaboration Provisioning Metrics SLOs Applicable Network Security Concerns Lee et al.[15] Servers Master-Slave Data (flow) Network management IoT - Aazam et al.[16] Servers - Context (user) Resource management IoT - Jalali et al.[17] Servers Peer to Peer Time (computing) Power management CDN - Zhu et al.[18] Servers - Context (user) Application management CDN - Zeng et al.[19] Servers Peer to Peer Time (communication, computation) Resource management IoT - Hong et al.[20] Network devices Peer to Peer Data (size) Application management IoT - Nazmudeen et al.[21] Network devices Master-Slave Data (size) Data management PLC - Aazam et al.[22] Network devices - Data (size) Network management IoT Data encryption Cirani et al.[23] Network devices - Context (application) Network management IoT DoS attack Dsouza et al.[24] Cloudlets Peer to Peer Context (application) Network management IoT Authentication Cardellini et al.[25] Cloudlets Cluster Context (application) Application management IoT - Yan et al.[26] Base stations Cluster Context (user) Application management RAN - Gu et al.[27] Base stations Peer to Peer Cost (deployment, communication) Resource management IoT - Truong et al.[28] Base stations Master-Slave Context (application) Network management Vehicular network - Oueis et al.[29] Base stations Cluster Time (deadline) Latency management Mobile network - Hou et al.[30] Vehicles Cluster Context (user) Resource management Vehicular Privacy Ye et al.[31] Vehicles - Time (deadline) Application management Vehicular - Oueis et al.[32] Base stations Cluster Data (flow) Resource management Mobile network - Faruque et al.[33] Network devices Cluster Energy consumption Power management IoT - Shi et al.[34] Network devices Peer to Peer Context (application) Application management Mobile network - Giang et al.[35] Network devices Peer to Peer Data (flow) Application management IoT - Intharawijitr et al.[36] Servers - Time (communication, computation) Latency management Mobile network - Peng et al.[37] Base stations Peer to Peer Data (size) Network management RAN - Hassan et al.[38] Network devices Cluster Cost (execution, communication) Application management Mobile network Privacy Zhang et al.[39] Cloudlets Peer to Peer Cost (deployment) Cost management LRPON - Deng et al.[40] Network devices Peer to Peer Data (Size) Application management Mobile network - Do et al.[41] Network devices - Energy consumption CO2 management CDN - Aazam et al.[42] Servers - Context (user) Resource management IoT - Datta et al.[43] Network devices Peer to Peer Context (user) Data management Vehicular network - Aazam et al.[44] Servers - Context (user) Resource management IoT - Gazis et al.[45] Network devices - Context (application) Resource management IoT -

Fog Computing: A Taxonomy, Survey and Future Directions

Fog Computing: A Taxonomy, Survey and Future Directions Fog Computing: A Taxonomy, Survey and Future Directions Redowan Mahmud, Ramamohanarao Kotagiri and Rajkumar Buyya Abstract In recent years, the number of Internet of Things (IoT) devices/sensors has increased

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

When ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G

When ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G When ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G Motivation Mobile Internet and explosion of its applications,

More information

Mobile Edge Computing for 5G: The Communication Perspective

Mobile Edge Computing for 5G: The Communication Perspective Mobile Edge Computing for 5G: The Communication Perspective Kaibin Huang Dept. of Electrical & Electronic Engineering The University of Hong Kong Hong Kong Joint Work with Yuyi Mao (HKUST), Changsheng

More information

An Architecture. What the MEC? for 5G

An Architecture. What the MEC? for 5G An Architecture What the MEC? for 5G What the MEC? An architecture for 5G As we stated in the first e-book in this series, the evolution from LTE to 5G will be the most profound transformation on the wireless

More information

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University)

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) APPLICATION DEPLOYMENT IN FUTURE GLOBAL MULTI-CLOUD ENVIRONMENT Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) GITMA 2015 Conference, St. Louis, June 23, 2015 These

More information

Mobile Edge Computing:

Mobile Edge Computing: Mobile Edge Computing: Accelerating to 5G Era Hannu Flinck January 2016 1 Nokia 2015 Current megatrends Mobile computing, 5G and cloud computing Mobile computing Cloud computing 2 Nokia 2015 Architecture

More information

Udaipur, Rajasthan, India. University, Udaipur, Rajasthan, India

Udaipur, Rajasthan, India. University, Udaipur, Rajasthan, India ROLE OF NETWORK VIRTUALIZATION IN CLOUD COMPUTING AND NETWORK CONVERGENCE 1 SHAIKH ABDUL AZEEM, 2 SATYENDRA KUMAR SHARMA 1 Research Scholar, Department of Computer Science, Pacific Academy of Higher Education

More information

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan Vehicular Cloud Computing: A Survey Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan OUTLINE OF TOPICS INTRODUCETION AND MOTIVATION TWO-TIER VEHICULAR

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT When used

More information

Figure Potential 5G applications

Figure Potential 5G applications 6. 5G Key Concept 6.1 Key Concepts of 5G End-to-end (E2E) quality required by applications and/or users will be far more diversified in the 5G era than what we have seen in the preceding generations. For

More information

Security improvement in IOT based on Software

Security improvement in IOT based on Software International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 122 Security improvement in IOT based on Software Raghavendra Reddy, Manoj Kumar, Dr K K Sharma Abstract With the

More information

Virtualization and Softwarization Technologies for End-to-end Networking

Virtualization and Softwarization Technologies for End-to-end Networking ization and Softwarization Technologies for End-to-end Networking Naoki Oguchi Toru Katagiri Kazuki Matsui Xi Wang Motoyoshi Sekiya The emergence of 5th generation mobile networks (5G) and Internet of

More information

Transformation Through Innovation

Transformation Through Innovation Transformation Through Innovation A service provider strategy to prosper from digitization People will have 11.6 billion mobile-ready devices and connections by 2020. For service providers to thrive today

More information

WeVe: When Smart Wearables Meet Intelligent Vehicles

WeVe: When Smart Wearables Meet Intelligent Vehicles WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet

More information

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex Whitepaper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems www.adlinktech.com 2017 Table of Contents 1. Introduction........ P 3 2. Iot and

More information

The CORD reference architecture addresses the needs of various communications access networks with a wide array of use cases including:

The CORD reference architecture addresses the needs of various communications access networks with a wide array of use cases including: Introduction Today s Mobile Network Operator (MNO) infrastructure is built with proprietary vertically integrated Network Elements (NEs), leading to inefficient utilization of network resources. Further,

More information

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification: Application control : Boundary control : Access Controls: These controls restrict use of computer system resources to authorized users, limit the actions authorized users can taker with these resources,

More information

IPv6-based Beyond-3G Networking

IPv6-based Beyond-3G Networking IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless

More information

Chapter 2 Communication for Control in Heterogeneous Power Supply

Chapter 2 Communication for Control in Heterogeneous Power Supply Chapter 2 Communication for Control in Heterogeneous Power Supply The need to modernize the power grid infrastructure, and governments commitment for a cleaner environment, is driving the move towards

More information

Connected World. Connected Experiences. Fronthaul Technologies in vran

Connected World. Connected Experiences. Fronthaul Technologies in vran Connected World. Connected Experiences. Fronthaul Technologies in vran Introduction The mobile communication industry is currently heading towards the fifth generation (5G) network. The new network strategy

More information

C2OF2N: a low power cooperative code offloading method for femtolet-based fog network

C2OF2N: a low power cooperative code offloading method for femtolet-based fog network J Supercomput https://doi.org/10.1007/s11227-018-2269-x C2OF2N: a low power cooperative code offloading method for femtolet-based fog network Anwesha Mukherjee 1 Priti Deb 2 Debashis De 2 Rajkumar Buyya

More information

Mobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK

Mobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK Mobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK 1 ETSI 2013. All rights reserved Trends and market drivers Growth in mobile

More information

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

Research Faculty Summit Systems Fueling future disruptions

Research Faculty Summit Systems Fueling future disruptions Research Faculty Summit 2018 Systems Fueling future disruptions Elevating the Edge to be a Peer of the Cloud Kishore Ramachandran Embedded Pervasive Lab, Georgia Tech August 2, 2018 Acknowledgements Enrique

More information

Creating the Future on the Shoulders of a Giant ZTE Flagship Tbit Optical Platform

Creating the Future on the Shoulders of a Giant ZTE Flagship Tbit Optical Platform Creating the Future on the Shoulders of a Giant ------ZTE Flagship Tbit Optical Platform Led by the rapid development of emerging services including HD (high definition) video, VR (virtual reality) and

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Distributed System Framework for Mobile Cloud Computing

Distributed System Framework for Mobile Cloud Computing Bonfring International Journal of Research in Communication Engineering, Vol. 8, No. 1, February 2018 5 Distributed System Framework for Mobile Cloud Computing K. Arul Jothy, K. Sivakumar and M.J. Delsey

More information

THE BUSINESS POTENTIAL OF NFV/SDN FOR TELECOMS

THE BUSINESS POTENTIAL OF NFV/SDN FOR TELECOMS WHITE PAPER THE BUSINESS POTENTIAL OF NFV/SDN FOR TELECOMS WHAT YOU WILL LEARN What are the potential benefits of implementing Network Function Virtualization (NFV) and software-defined networking (SDN)?

More information

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING Mrs. Shweta Agarwal Assistant Professor, Dept. of MCA St. Aloysius Institute of Technology, Jabalpur(India) ABSTRACT In the present study,

More information

Revolutionising mobile networks with SDN and NFV

Revolutionising mobile networks with SDN and NFV Revolutionising mobile networks with SDN and NFV Cambridge Wireless Virtual Networks SIG 8 th May 2014 Philip Bridge, Senior Network Architect at EE May 2014 Networks are getting messy Vertically integrated

More information

Multi-Domain Service Optimization

Multi-Domain Service Optimization Multi-Domain Service Optimization 1. High-level summary New solutions need to be fifth-generation (5G)- and service-ready while covering the entire network along with individual network slice instances

More information

TELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth«

TELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth« REPUBLIC OF ALBANIA ELECTRONIC AND POSTAL COMMUNICATIONS AUTHORITY - AKEP TELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth« SUMMARY What is Smart Grid Communications Networks

More information

UNIVERSITY OF CAGLIARI

UNIVERSITY OF CAGLIARI UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet SDN: Control Plane ACK: content taken from Foundations of Modern

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

WP-PD Wirepas Mesh Overview

WP-PD Wirepas Mesh Overview WP-PD-123 - Wirepas Mesh Overview Product Description Version: v1.0a Wirepas Mesh is a de-centralized radio communications protocol for devices. The Wirepas Mesh protocol software can be used in any device,

More information

Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995

Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995 Network Working Group Y. Rekhter Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995 Status of this Memo Routing in a Multi-provider Internet This memo

More information

Mobile-Edge Computing. Zhiyong Chen Department of Electronic Engineering Shanghai Jiao Tong University, China Nov

Mobile-Edge Computing. Zhiyong Chen Department of Electronic Engineering Shanghai Jiao Tong University, China Nov 1896 1920 1987 2006 Mobile-Edge Computing Zhiyong Chen Department of Electronic Engineering Shanghai Jiao Tong University, China Nov. 27 2017 1 MOBILE COMPUTATION DEMANDS 2 Navigation Monitor and control

More information

Center for Cloud and Autonomic Computing (CAC)

Center for Cloud and Autonomic Computing (CAC) A CISE-funded Center University of Florida, Jose Fortes, 352.392.9265, fortes@ufl.edu Rutgers University, Manish Parashar, 732.445.4388, parashar@cac.rutgers.edu University of Arizona, Salim Hariri, 520.621.4378,

More information

Multi-tenancy of network operators and edge cloud services using small cells

Multi-tenancy of network operators and edge cloud services using small cells Multi-tenancy of network operators and edge cloud services using small cells Emmanouil Kafetzakis, Ph.D. ORION Innovations P.C. mkafetz@orioninnovations.gr Infocom World 2017, 25-10-2017 Athens, Greece

More information

WAN Application Infrastructure Fueling Storage Networks

WAN Application Infrastructure Fueling Storage Networks WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

HOW SDN AND NFV EXTEND THE ADOPTION AND CAPABILITIES OF SELF-ORGANIZING NETWORKS (SON)

HOW SDN AND NFV EXTEND THE ADOPTION AND CAPABILITIES OF SELF-ORGANIZING NETWORKS (SON) WHITE PAPER HOW SDN AND NFV EXTEND THE ADOPTION AND CAPABILITIES OF SELF-ORGANIZING NETWORKS (SON) WHAT WILL YOU LEARN? n SON in the radio access network n Adoption of SON solutions typical use cases n

More information

Mobile Edge Computing

Mobile Edge Computing Mobile Edge Computing A key technology towards 5G 1 Nurit Sprecher (Chair of ETSI MEC ISG) 5G World 2016, London, UK 5G Use Cases and Requirements 5G Use Cases Families and Related Examples Build a virtual

More information

SD-WAN Transform Your Agency

SD-WAN Transform Your Agency Federal SD-WAN Transform Your Agency 1 Overview Is your agency facing network traffic challenges? Is migration to the secured cloud hogging scarce bandwidth? How about increased mobile computing that is

More information

Lecture 14 SDN and NFV. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 14 SDN and NFV. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 14 SDN and NFV Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Traditional network vs SDN TRADITIONAL Closed equipment Software + hardware Cost Vendor-specific management.

More information

Guide to SDN, SD-WAN, NFV, and VNF

Guide to SDN, SD-WAN, NFV, and VNF Evalu- ation Guide Technical Brief SD-WAN, NFV, and With so many acronyms and each one building on another, it can be confusing about how they work together. This guide describes the difference. 006180206

More information

A Software-Defined WAN is a Business Imperative

A Software-Defined WAN is a Business Imperative A Software-Defined WAN is a Business Imperative A CBTS White Paper Introduction: It s Time for the WAN to Evolve Almost every IT and business leader today is focused on creating a more agile business.

More information

UNIVERSITY OF CAGLIARI

UNIVERSITY OF CAGLIARI UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet NFV ACK: content taken from Foundations of Modern Networking, SDN,

More information

8. CONCLUSION AND FUTURE WORK. To address the formulated research issues, this thesis has achieved each of the objectives delineated in Chapter 1.

8. CONCLUSION AND FUTURE WORK. To address the formulated research issues, this thesis has achieved each of the objectives delineated in Chapter 1. 134 8. CONCLUSION AND FUTURE WORK 8.1 CONCLUSION Virtualization and internet availability has increased virtualized server cluster or cloud computing environment deployments. With technological advances,

More information

Simplifying WAN Architecture

Simplifying WAN Architecture Simplifying WAN Architecture Migrating without a network forklift upgrade Phased approach with existing environment Architecture and management complexity Automation of deployment, management and maintenance

More information

Star: Sla-Aware Autonomic Management of Cloud Resources

Star: Sla-Aware Autonomic Management of Cloud Resources Star: Sla-Aware Autonomic Management of Cloud Resources Sakshi Patil 1, Meghana N Rathod 2, S. A Madival 3, Vivekanand M Bonal 4 1, 2 Fourth Sem M. Tech Appa Institute of Engineering and Technology Karnataka,

More information

Research on Heterogeneous Network Integration in Distribution Communication Network

Research on Heterogeneous Network Integration in Distribution Communication Network Research on Heterogeneous Integration in Distribution Communication Wei Li 1, Haonan Zheng 1, Hui He 1 1 (School of Control and Computer Engineering, North China Electric Power University, China) Abstract:

More information

CHAPTER 7 CONCLUSION AND FUTURE SCOPE

CHAPTER 7 CONCLUSION AND FUTURE SCOPE 121 CHAPTER 7 CONCLUSION AND FUTURE SCOPE This research has addressed the issues of grid scheduling, load balancing and fault tolerance for large scale computational grids. To investigate the solution

More information

CLOUD COMPUTING ABSTRACT

CLOUD COMPUTING ABSTRACT Ruchi Saraf CSE-VII Sem CLOUD COMPUTING By: Shivali Agrawal CSE-VII Sem ABSTRACT Cloud computing is the convergence and evolution of several concepts from virtualization, distributed application design,

More information

Huawei Agile Campus Network Solution

Huawei Agile Campus Network Solution Huawei Agile Campus Network Solution HUAWEI TECHNOLOGIES CO., LTD. Bantian, Longgang District Shenzhen518129, P. R. China Tel:+86-755-28780808 HUAWEI TECHNOLOGIES CO., LTD. 01 Network Development Trends

More information

Addressing Unique M2M Challenges with Converged Gateways

Addressing Unique M2M Challenges with Converged Gateways October 19-20, 2010 Addressing Unique M2M Challenges with Converged Gateways Paul L. Russell, Jr. Paul.Russell@InterDigital.com ETSI TC M2M Workshop 19-20 October 2010, Sophia Antipolis, France Where are

More information

Fog Computing Based Radio Access Networks: Issues and Challenges

Fog Computing Based Radio Access Networks: Issues and Challenges Fog Computing Based Radio Access Networks: Issues and Challenges Mugen Peng and Zhongyuan Zhao ({pmg, zyzhao}@bupt.edu.cn) Beijing University of Posts & Telecommunications 2015.10.29 1 Outline Background

More information

ICN & 5G. Dr.-Ing. Dirk Kutscher Chief Researcher Networking. NEC Laboratories Europe

ICN & 5G. Dr.-Ing. Dirk Kutscher Chief Researcher Networking. NEC Laboratories Europe ICN & 5G Dr.-Ing. Dirk Kutscher Chief Researcher Networking NEC Laboratories Europe Performance and Security Today User Equipment Access Network Core/Service Network Application Servers 2 NEC Corporation

More information

MASERGY S MANAGED SD-WAN

MASERGY S MANAGED SD-WAN MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

SEVEN Networks Open Channel Traffic Optimization

SEVEN Networks Open Channel Traffic Optimization SEVEN Networks Open Channel Traffic Optimization Revision 3.0 March 2014 The Open Channel family of software products is designed to deliver device-centric mobile traffic management and analytics for wireless

More information

Cloud Computing WSU Dr. Bahman Javadi. School of Computing, Engineering and Mathematics

Cloud Computing WSU Dr. Bahman Javadi. School of Computing, Engineering and Mathematics Cloud Computing Research @ WSU Dr. Bahman Javadi School of Computing, Engineering and Mathematics Research Team and Research Interests Team 4 Academic Staff 5 PhD Students 1 Master Student Resource Scheduling

More information

An Architecture For Computational Grids Based On Proxy Servers

An Architecture For Computational Grids Based On Proxy Servers An Architecture For Computational Grids Based On Proxy Servers P. V. C. Costa, S. D. Zorzo, H. C. Guardia {paulocosta,zorzo,helio}@dc.ufscar.br UFSCar Federal University of São Carlos, Brazil Abstract

More information

Grid Computing Systems: A Survey and Taxonomy

Grid Computing Systems: A Survey and Taxonomy Grid Computing Systems: A Survey and Taxonomy Material for this lecture from: A Survey and Taxonomy of Resource Management Systems for Grid Computing Systems, K. Krauter, R. Buyya, M. Maheswaran, CS Technical

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

Journey to the Cloud Next Generation Infrastructure for the future workforce.

Journey to the Cloud Next Generation Infrastructure for the future workforce. Journey to the Cloud Next Generation Infrastructure for the future workforce. Steven J. Davis Managing Director Infrastructure Consulting ASEAN Accenture What is the Internet & Cloud The Internet traditionally

More information

SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN

SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN S O L U T I O N O V E R V I E W SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN Today s branch office users are consuming more wide area network (WAN) bandwidth

More information

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 05 Basics of IoT Networking-Part-I In this lecture and

More information

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption Ruilong Deng 1,4, Rongxing Lu 1, Chengzhe Lai 2, Tom H. Luan 3, and Hao Liang 4 1: Nanyang Technological University,

More information

Making Enterprise Branches Agile and Efficient with Software-defined WAN (SD-WAN)

Making Enterprise Branches Agile and Efficient with Software-defined WAN (SD-WAN) Making Enterprise Branches Agile and Efficient with Software-defined WAN (SD-WAN) Simplify your branch office network with assured application performance with clouddelivered SD-WAN. EXECUTIVE SUMMARY

More information

PROVIDING NETWORK OPERATOR MULTI-TENANCY AND EDGE CLOUD SERVICES USING SMALL CELLS

PROVIDING NETWORK OPERATOR MULTI-TENANCY AND EDGE CLOUD SERVICES USING SMALL CELLS PROVIDING NETWORK OPERATOR MULTI-TENANCY AND EDGE CLOUD SERVICES USING SMALL CELLS Ioannis Giannoulakis, Ph.D. National Centre for Scientific Research Demokritos giannoul@iit.demokritos.gr Emmanouil Kafetzakis,

More information

A Perspective on Multi-Access Edge Computing. Frank Rayal. January San Francisco Singapore Dubai Paris

A Perspective on Multi-Access Edge Computing. Frank Rayal. January San Francisco Singapore Dubai Paris A Perspective on Multi-Access Edge Computing Frank Rayal January 2017 San Francisco Singapore Dubai Paris Page 2 Overview The convergence of the Internet and telecommunication networks is igniting a debate

More information

A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things

A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things Xuchao Chang, Chunhong Zhang, Li Sun Beijing University of Posts and Telecommunications, Beijing, 100876, China E-mail:

More information

Flexible and cost efficient optical 5G transport Paolo Monti

Flexible and cost efficient optical 5G transport Paolo Monti Flexible and cost efficient optical 5G transport Paolo Monti Optical Networks Laboratory (ONLab) Communication System Department (COS) KTH Royal Institute of Technology Sweden Acknowledgements Matteo Fiorani

More information

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING. NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING. The old mantra of trust but verify just is not working. Never trust and verify is how we must apply security in this era of sophisticated breaches.

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Simplifying the Branch Network

Simplifying the Branch Network Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing

More information

CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT

CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT This chapter discusses software based scheduling and testing. DVFS (Dynamic Voltage and Frequency Scaling) [42] based experiments have

More information

INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL.

INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. From IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 Presented by: Abid Contents Objective Introduction Smart City Concept & Services

More information

The path toward C-RAN and V-RAN: benefits and challenges from operator perspective

The path toward C-RAN and V-RAN: benefits and challenges from operator perspective TELECOM ITALIA GROUP 5G World Summit London, 29-30 June 2016 : benefits and challenges from operator perspective Marco Caretti Telecom Italia Engineering & TiLAB Agenda The drivers for the RAN evolution

More information

Overview of the Juniper Networks Mobile Cloud Architecture

Overview of the Juniper Networks Mobile Cloud Architecture Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

IEEE networking projects

IEEE networking projects IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified

More information

Fog Computing. The scenario

Fog Computing. The scenario Università degli Studi di Roma Tor Vergata Dipartimento di Ingegneria Civile e Ingegneria Informatica Fog Computing Corso di Sistemi e Architetture per Big Data A.A. 2016/17 Valeria Cardellini The scenario

More information

Vortex Whitepaper. Intelligent Data Sharing for the Business-Critical Internet of Things. Version 1.1 June 2014 Angelo Corsaro Ph.D.

Vortex Whitepaper. Intelligent Data Sharing for the Business-Critical Internet of Things. Version 1.1 June 2014 Angelo Corsaro Ph.D. Vortex Whitepaper Intelligent Data Sharing for the Business-Critical Internet of Things Version 1.1 June 2014 Angelo Corsaro Ph.D., CTO, PrismTech Vortex Whitepaper Version 1.1 June 2014 Table of Contents

More information

Network-Aware Resource Allocation in Distributed Clouds

Network-Aware Resource Allocation in Distributed Clouds Dissertation Research Summary Thesis Advisor: Asst. Prof. Dr. Tolga Ovatman Istanbul Technical University Department of Computer Engineering E-mail: aralat@itu.edu.tr April 4, 2016 Short Bio Research and

More information

Enabling Smart Energy as a Service via 5G Mobile Network advances

Enabling Smart Energy as a Service via 5G Mobile Network advances NR 5 Enabling Smart Energy as a Service via 5G Mobile Network advances 5G-PPP Phase 2 at EuCNC Oulu Fiorentino Giampaolo giampaolo.fiorentino@eng.it SCOPE MOTIVATION NR 5 Insights behind... The state of

More information

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains

More information

Smart Grid Communications and Networking

Smart Grid Communications and Networking Smart Grid Communications and Networking EKRAM HOSSAIN University of Manitoba, Canada ZHU HAN University of Houston, Texas H. VINCENT POOR Princeton University, New Jersey CAMBRIDGE UNIVERSITY PRESS Contents

More information

5G radio access. ericsson White paper Uen June research and vision

5G radio access. ericsson White paper Uen June research and vision ericsson White paper 284 23-3204 Uen June 2013 5G radio access research and vision 5G will enable the long-term Networked Society and realize the vision of unlimited access to information for anyone and

More information

DOCSIS FOR LTE SMALL CELL BACKHAUL ADDRESSING PERFORMANCE AND THROUGHPUT REQUIREMENTS FOR MOBILE BACKHAUL

DOCSIS FOR LTE SMALL CELL BACKHAUL ADDRESSING PERFORMANCE AND THROUGHPUT REQUIREMENTS FOR MOBILE BACKHAUL DOCSIS FOR LTE SMALL CELL BACKHAUL ADDRESSING PERFORMANCE AND THROUGHPUT REQUIREMENTS FOR MOBILE BACKHAUL WHITE PAPER Small cells can be used to increase wireless network capacity, provide coverage in

More information

ICN for Cloud Networking. Lotfi Benmohamed Advanced Network Technologies Division NIST Information Technology Laboratory

ICN for Cloud Networking. Lotfi Benmohamed Advanced Network Technologies Division NIST Information Technology Laboratory ICN for Cloud Networking Lotfi Benmohamed Advanced Network Technologies Division NIST Information Technology Laboratory Information-Access Dominates Today s Internet is focused on point-to-point communication

More information

System Support for Internet of Things

System Support for Internet of Things System Support for Internet of Things Kishore Ramachandran (Kirak Hong - Google, Dave Lillethun, Dushmanta Mohapatra, Steffen Maas, Enrique Saurez Apuy) Overview Motivation Mobile Fog: A Distributed

More information

Mobile Edge Computing

Mobile Edge Computing Mobile Edge Computing 기술동향 Sung-Yeon Kim, Ph.D. Sung-Yeon.Kim@InterDigital.com 1 Outline Mobile Edge Computing Overview Mobile Edge Computing Architecture Mobile Edge Computing Application Mobile Edge

More information

ITU Workshop on Telecommunication Service Quality. Service assurance for Virtualized Networks and End-to-End Xhaul and C-RAN

ITU Workshop on Telecommunication Service Quality. Service assurance for Virtualized Networks and End-to-End Xhaul and C-RAN ITU Workshop on Telecommunication Service Quality Service assurance for Virtualized Networks and End-to-End Xhaul and C-RAN Evgeny Romanov, Solution Engineer, InfoVista www.infovista.com VistaInsight,

More information

Introduction to Distributed Systems. INF5040/9040 Autumn 2018 Lecturer: Eli Gjørven (ifi/uio)

Introduction to Distributed Systems. INF5040/9040 Autumn 2018 Lecturer: Eli Gjørven (ifi/uio) Introduction to Distributed Systems INF5040/9040 Autumn 2018 Lecturer: Eli Gjørven (ifi/uio) August 28, 2018 Outline Definition of a distributed system Goals of a distributed system Implications of distributed

More information